whitepaper: enterprise mobility management...

of 7 /7
WHITE PAPER ENTERPRISE MOBILITY MANAGEMENT 101

Author: others

Post on 20-May-2020

0 views

Category:

Documents


0 download

Embed Size (px)

TRANSCRIPT

  • WHITE PAPER

    ENTERPRISE MOBILITYMANAGEMENT 101

  • Enterprise Mobility Management 101 2

    ENABLING SECURITY AND PRODUCTIVITYEnterprise mobility empowers employees to be more productive and efficient – from anywhere and at any time. Mobility offers the freedom and flexibility that better conforms to a digital workplace and workforce, one that is not required to be tethered to physical offices.

    At the same time, for mobility to be most effective for employers and employees, tools and architectures that are standard in a physical office need to be easy to use in remote situations. Enterprise mobility can impact the way we work and do business. However, mobility can also create new network vulnerabilities or opportunities for malicious actors.

    SO, HOW CAN YOU EMBRACE ENTERPRISE MOBILITY WHILE SAFEGUARDING YOUR NETWORK?

  • Enterprise Mobility Management 101 3

    ENTERPRISE MOBILITY CHECKLIST

    Does your organization have a BYOD policy in place? If so, does it need to be updated?

    Have you designated who will own and manage mobility?

    Do you have control over your information assets?

    Can your employees securely access files from your organization’s network?

    Do you have visibility into who accesses your information assets?

    Is your network compliant with government or industry regulations?

    MINIMIZE SECURITY RISKS BY IMPLEMENTING A BYOD POLICYYou can’t talk about Enterprise Mobility without addressing Bring Your Own Device or BYOD. With BYOD, the line between business and personal resources becomes increasingly blurred. Implementing a BYOD policy is the first step in creating a productive and secure environment.

    BYOD doesn’t have to be a free for all. Organizations can restrict which types of devices, operating systems, and other tools are permissible for use at work and on the corporate network.

    Businesses must prevent employees from introducing vulnerabilities and threats into their secure environments. Develop requirements for employees to use antivirus programs, secure passwords and approved applications that can provide IT with control over unauthorized activities. Require encryption for sensitive data and institute continuing education programs for employees regarding when it is acceptable to use cloud applications – or why they cannot.

  • Enterprise Mobility Management 101 4

    POLICY ENFORCEMENT Setting rules and the policy is only part of the process. You must also establish plans and protocols to enforce BYOD or other mobility policy requirements. The measures must be clear and communicated to workers. Information privacy is also an important consideration.

    Employees can be uncomfortable with the idea that their IT team can monitor their device accounts, which also can be used for personal reasons. Organizations should also be aware that a number of states have introduced legislation limiting employers’ abilities to access specific information or data on their workers, like their social media accounts.

    After consulting with legal teams, organizations should balance protecting corporate resources with respecting workers’ privacy regarding the personal information on their devices. Decision makers must establish how they’ll control and manage user access to company accounts and applications, which can help create clearer distinctions between corporate and personal resources.

    Lastly, establish an employee exit plan. When workers leave the organization, especially if leaving on unpleasant terms, it could pose significant risks and open your organization up to a potential data breach. Establish processes and procedures for removing access to apps and resources previously accessible or stored on devices or within applications. This should include the ability to wipe corporate data from devices, even if they are owned by the employee. Such protocols should be clearly explained to workers before they begin taking part in a mobility initiative.

    It’s clear that there are many security risks involved with enterprise mobility and BYOD. Implementing a strong mobility policy is a very effective preventative measure and it’s key to successfully managing enterprise mobility and BYOD.

    “IT IS IMPORTANT TO REALIZE THAT CYBERSECURITY ISN’T JUST AN IT SECURITY PROBLEM ANYMORE. ENSURING THAT EVERYONE UNDERSTANDS THAT IMPORTANCE OF CYBERATTACK PREVENTION, IDENTIFICATION, AND REMEDIATION MUST BE WOVEN THROUGHOUT THE FABRIC OF THE ENTERPRISE.” - Anthony Grieco, Senior Director of Security and Trust at Cisco via TechRepublic

    http://www.techrepublic.com/article/how-enterprise-companies-can-raise-internal-cyber-risk-awareness/

  • Enterprise Mobility Management 101 5

    TOOLS THAT SUPPORT ENTERPRISE MOBILITY Not all technologies are created equal when it comes to EMM. Managed file transfer platforms and enterprise file sync and share tools can be used to manage data flow and access. Any EMM solutions implemented should meet specific requirements to provide you with the visibility, security, and control necessary for your mobility-friendly environment.

    Enhanced File Transfer™ (EFT™) by Globalscape is a managed file transfer platform that offers simplicity, security and stability. If you’re looking for enhanced mobile controls with your managed file transfer solution, EFT has two specific clients that help provide the EMM controls you’re looking for.

    • The Web Transfer Client (WTC) allows access to the EFT platform from any modern web browser. This tool provides ease of connectivity for its users. For administrators, the WTC means more flexibility for partners, lower cost, reduced setup and implementation times, zero maintenance, and connection from any computer connected to the Internet.

    • The Mobile Transfer Client (MTC) mobile app, developed for use with EFT, allows your employees to use their mobile devices to access corporate data, while keeping your network secure. MTC is a BYOD and enterprise mobility-friendly tool that keeps files safe in transit and while at rest. With MTC, your organization has the right balance of employee productivity, efficiency, and corporate data security, allowing employees to be on the move with secure access to EFT.

    Deploying an enterprise file sharing and collaboration tool is an easy way to enable a secure EMM environment. Globalscape’s file sharing and collaboration solution, Workspaces, is designed for organizations that want to provide their users with a robust set of features to share or access data.

    Workspaces gives enterprise users secure content mobility, providing the ability to share and access corporate data anytime on any device, while giving IT the administrative oversight, control, and security necessary to keep users and corporate assets safe. Workspaces offers secure content mobility, which means that you can access and share content through the EFT platform while minimizing security risks.

    “ The majority of security professionals (87%) are most concerned about naive individuals or careless employees who bend the rules to get their job done.”

    – Infosecurity Magazine and a survey by Dimensional Research

    87%

    https://www.globalscape.com/managed-file-transferhttp://www.infosecurity-magazine.com/news/half-of-it-pros-say-insider/

  • Enterprise Mobility Management 101 6

    CONCLUSIONIf you want to keep your network secure and protect your corporate assets, then developing and enforcing policy is paramount. Secure mobility in an enterprise environment is achievable. First, be sure to restrict the types of mobile devices or applications that are permitted on your network. You can also keep sensitive data safe through encryption. Mobile devices are often an insecure point of entry for hackers or thieves, so be sure to require the use of an antivirus program and password protection for mobile devices.

    Additionally, there are often legal implications to consider when drawing out your mobility policy. Since individuals may be using a personal mobile device to view work assets, there will be privacy issues to consider. Consult with your legal team on how to balance workers’ privacy, while protecting corporate assets. And last, always have an employee exit plan. Regardless of the situation, anytime an employee leaves there is a greater risk for a data breach.

    Enterprise mobility and BYOD is here to stay. Minimizing the many security risks through a strong mobility program is the best way to navigate through this modern dilemma. Ultimately, you want to empower your technology managers to own the process. Soon you will find that your organization’s network will be more secure and your employees will be more productive and happy.

    Learn more about Enterprise Mobility Management at www.globalscape.com

    www.globalscape.com

  • GlobalSCAPE, Inc. (GSB)Corporate Headquarters4500 Lockhill-Selma Rd, Suite 150San Antonio, TX 78249, USASales: 210-308-8267 / Toll Free: 800-290-5054Technical Support: 210-366-3993Web Support: www.globalscape.com/support© 2018 GlobalSCAPE, Inc. All Rights Reserved

    MAKE BUSINESS FLOW BRILLIANTLYGlobalscape, Inc. (NYSE MKT: GSB) is a pioneer in securing and automating the movement and integration of data seamlessly in, around and outside your business, between applications, people and places, in and out of the cloud. Whether you are a line-of-business stakeholder struggling to connect multiple cloud applications or an IT professional tasked with integrating partner data into homegrown or legacy systems, Globalscape provides cloud services that automate your work, secure your data and integrate your applications – while giving visibility to those who need it. Globalscape makes business flow brilliantly. For more information, visit www.globalscape.com or follow the blog and Twitter updates.